CAONIMADESHAWO
FuckTray
Install
RunInstall
RunUninstall
Static task
static1
Behavioral task
behavioral1
Sample
769caf05fdcae05a275a49429c61f113_JaffaCakes118.dll
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
769caf05fdcae05a275a49429c61f113_JaffaCakes118.dll
Resource
win10v2004-20240709-en
Target
769caf05fdcae05a275a49429c61f113_JaffaCakes118
Size
72KB
MD5
769caf05fdcae05a275a49429c61f113
SHA1
8464c0d61f2a94503a02ef71271756c85fdaf9ef
SHA256
68b71d732e1cfdd69f55c55ddaabe9b0f9d8ba3636c17a51ea7df4b6cee56f52
SHA512
44af3e784f3a8d3b535f44c3f114422e2fe0f7571e53845f5a2dc9f41a0e637014444cc4b1d369dbb1399e63d0531b956f63215e9cdc37b5ee0441ae30e9b6c4
SSDEEP
1536:12pP1Y54POtO0RcQ0OfJIFnToIfOTvowrOIEuUC:1WSPcQ0OfJItTBfkvowrOIEuUC
Checks for missing Authenticode signature.
resource |
---|
769caf05fdcae05a275a49429c61f113_JaffaCakes118 |
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sleep
ReadFile
CreateProcessA
GetSystemDirectoryA
GetStartupInfoA
CloseHandle
CreatePipe
FreeLibrary
GetProcAddress
LoadLibraryA
FindClose
FindNextFileA
GetLastError
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
DeleteFileA
CopyFileA
MoveFileA
GetCurrentProcess
lstrcpyA
lstrlenA
HeapAlloc
GetProcessHeap
lstrcatA
SetLastError
Process32Next
GetPriorityClass
OpenProcess
Module32First
Process32First
CreateToolhelp32Snapshot
TerminateProcess
WaitForSingleObject
CreateThread
WinExec
MoveFileExA
GetModuleFileNameA
GetTickCount
SetThreadPriority
GetCurrentThread
GetFileSize
CreateFileA
WriteFile
ExitProcess
CreateMutexA
FreeConsole
lstrcmpiA
GetTempPathA
GlobalMemoryStatus
GetVersionExA
GetComputerNameA
InterlockedExchange
GetCurrentProcessId
GetCurrentThreadId
RaiseException
LocalAlloc
??2@YAPAXI@Z
strstr
_except_handler3
__CxxFrameHandler
_CxxThrowException
atoi
strcspn
??3@YAXPAX@Z
wcstombs
rand
srand
malloc
??1type_info@@UAE@XZ
__dllonexit
_onexit
strncpy
sprintf
strncat
free
CAONIMADESHAWO
FuckTray
Install
RunInstall
RunUninstall
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ